For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×
United Kingdom

Theresa May Named UK's Internet Villain of the Year 5 5

An anonymous reader writes with news that Theresa May, the UK's Secretary of State for the Home Department, has been named the UK internet industry's villain of the year. She won this dubious honor for pushing the UK's controversial "snooper's charter" legislation, which would require ISPs to retain massive amounts of data regarding their subscribers for no less than a year. May championed the legislation without consulting the internet industry.

Conversely, "The MPs Tom Watson and David Davis were jointly named internet hero for their legal action against the Data Retention and Investigatory Powers Act. 'Surveillance has dominated both the hero and villain shortlists for number of years, and it was felt Davis and Watson were some of the best informed politicians on the subject,' the ISPA said."
Bitcoin

Bitcoin Snafu Causes Miners To Generate Invalid Blocks 63 63

An anonymous reader writes: A notice at bitcoin.org warns users of the cryptocurrency that many miners are currently generating invalid blocks. The cause seems to be out-of-date software, and software that assumed blocks were valid instead of checking them. They explain further "For several months, an increasing amount of mining hash rate has been signaling its intent to begin enforcing BIP66 strict DER signatures. As part of the BIP66 rules, once 950 of the last 1,000 blocks were version 3 (v3) blocks, all upgraded miners would reject version 2 (v2) blocks. Early morning UTC on 4 July 2015, the 950/1000 (95%) threshold was reached. Shortly thereafter, a small miner (part of the non-upgraded 5%) mined an invalid block--as was an expected occurrence. Unfortunately, it turned out that roughly half the network hash rate was mining without fully validating blocks (called SPV mining), and built new blocks on top of that invalid block. Note that the roughly 50% of the network that was SPV mining had explicitly indicated that they would enforce the BIP66 rules. By not doing so, several large miners have lost over $50,000 dollars worth of mining income so far."
Technology

Brain-Inspired 'Memcomputer' Constructed 35 35

New submitter DorkFest writes: "Inspired by the human brain, UC San Diego scientists have constructed a new kind of computer that stores information and processes it in the same place. This prototype 'memcomputer' solves a problem involving a large dataset more quickly than conventional computers, while using far less energy. ... Such memcomputers could equal or surpass the potential of quantum computers, they say, but because they don't rely on exotic quantum effects are far more easily constructed." The team, led by UC San Diego physicist Massimiliano Di Ventra published their results in the journal Science Advances.
DRM

Microsoft Edge, HTML5, and DRM 92 92

An anonymous reader writes: Microsoft is building its new browser, Edge, with the intention of avoiding many of the flaws that plagued Internet Explorer over its long and tumultuous life. Part of this involves moving away from plug-ins, and Edge will not support ActiveX. Instead, they're focusing on interoperable media, and that means non-plug-in video players that meet HTML5 specs. Of course, not all video players want to disseminate their content for free, which means: DRM. Microsoft's Edge team has published a new post explaining how they'll be handling support for DRM and "premium media" in the new browser.

They say, "Windows 10 and Microsoft Edge support DASH, MSE, EME and CENC natively, and other major browsers ship implementations of MSE and CENC compliant EME. This support allows developers to build plug-in free web video apps that runs across a huge range of platforms and devices, with each MSE/EME implementation built on top of a different media pipeline and DRM provider. In the days when DRM systems used proprietary file formats and encryption methods, this variation in DRM providers by browser would have presented a significant issue. With the development and use of Common Encryption (CENC), the problem is substantially reduced because the files are compressed in standard formats and encrypted using global industry standards. The service provider issues the keys and licenses necessary to consume the content in a given browser, but the website code, content and encryption keys are common across all of them, regardless of which DRM is in use."
Security

Researcher Who Reported E-voting Vulnerability Targeted By Police Raid in Argentina 69 69

TrixX writes: Police have raided the home of an Argentinian security professional who discovered and reported several vulnerabilities in the electronic ballot system (Google translation of Spanish original) to be used next week for elections in the city of Buenos Aires. The vulnerabilities (exposed SSL keys and ways to forge ballots with multiple votes) had been reported to the manufacturer of the voting machines, the media, and the public about a week ago. There has been no arrest, but his computers and electronics devices have been impounded (Spanish original). Meanwhile, the information security community in Argentina is trying to get the media to report this notorious attempt to "kill the messenger." Another source (Spanish original).
Sci-Fi

Frank Herbert's Dune, 50 Years On 128 128

An anonymous reader writes: This October will be the 50th anniversary of Frank Herbert's massively popular and influential sci-fi novel Dune. The Guardian has written a piece examining its effects on the world at large, and how the book remains relevant even now. Quoting: 'Books read differently as the world reforms itself around them, and the Dune of 2015 has geopolitical echoes that it didn't in 1965, before the oil crisis and 9/11. ... As Paul's destiny becomes clear to him, he begins to have visions 'of fanatic legions following the green and black banner of the Atreides, pillaging and burning across the universe in the name of their prophet Muad'Dib.' If Paul accepts this future, he will be responsible for 'the jihad's bloody swords,' unleashing a nomad war machine that will up-end the corrupt and oppressive rule of the emperor Shaddam IV (good) but will kill untold billions (not so good) in the process. In 2015, the story of a white prophet leading a blue-eyed brown-skinned horde of jihadis against a ruler called Shaddam produces a weird funhouse mirror effect, as if someone has jumbled up recent history and stuck the pieces back together in a different order."
Build

When Nerds Do BBQ 83 83

Rick Zeman writes: On this 4th of July, the day when Americans flock to their grills and smokers, Wired has a fascinating article on a computerized smoker designed by Harvard engineering students. They say, "In prototype form, the smoker looks like a combination of a giant pepper mill, a tandoori oven, and V.I.N.CENT from The Black Hole. It weighs 300 pounds. It has a refueling chute built into the side of it. And it uses a proportional-integral-derivative controller, a Raspberry Pi, and fans to regulate its own temperature, automatically producing an ideal slow-and-low burn."

After cooking >200 lbs of brisket while fine-tuning the design, the students concluded, "Old-school pitmasters are like, 'I cook mine in a garbage can,' and there's a point of pride in that. A lot of the cutting edge is when you take an art form and drag it back onto scientific turf and turn it into an algorithm. I don't think we've diluted the artistic component with this."
The Almighty Buck

Ask Slashdot: How Much Did Your Biggest Tech Mistake Cost? 283 283

NotQuiteReal writes: What is the most expensive piece of hardware you broke (I fried a $2500 disk drive once, back when 400MB was $2500) or what software bug did you let slip that caused damage? (No comment on the details — but about $20K cost to a client.) Did you lose your job over it? If you worked on the Mars probe that crashed, please try not to be the First Post, that would scare off too many people!
Transportation

Why Electric Vehicles Aren't More Popular 460 460

An anonymous reader writes: Ars takes a look at a recent report from the National Academy of Sciences into the reasons why more people aren't driving electric vehicles. Of course infrastructure issues are a part of it — until charging stations are ubiquitous, the convenience factor for using a gas-powered car will weigh heavily on consumers's minds. (This despite the prevalence of outlets at home and work, where the vast majority of charging will be done even with better infrastructure.) But other reasons are much more tractable. Simply giving somebody experience with an EV tends to make the fog of mystery surrounding them dissipate, and the design of the car counts for a lot, too. It turns out car buyers don't want their EVs to look different from regular cars.
Transportation

Solar Impulse 2 Completes Record-Breaking Flight 19 19

An anonymous reader writes: Solar Impulse 2, the airplane powered only by the sun's light, has completed its flight from Japan to Hawaii. The distance sets the record for manned, solar-powered flight, both by distance (7,200 km, according to the BBC) and by time spent aloft (118 hours). This was one leg in a longer journey to fly around the world, and by far the longest they've attempted. Their next leg will send them across the rest of the Pacific Ocean, landing in Phoenix, Arizona. Then they'll stop off at New York before crossing the Atlantic Ocean on their way back to the journey's starting point, Abu Dhabi. Pilot Andre Borschberg was in good shape, despite spending almost five consecutive days in command of the aircraft. He was only allowed to sleep for up to 20 minutes at a time, so he took about a dozen naps every day. He did this at an altitude of 9,000 meters, and while taking medication to prevent thrombosis. Borschberg's partner, Bertrand Piccard, will fly the aircraft during the next leg to Phoenix. This will happen as soon as the plane is checked out and meteorologists think the weather will be placid enough for a safe crossing.
United States

Wired Cautions Would-Be Drone Photogs on the 4th 61 61

Last year's spectacular but unauthorized you-are-there video from the inside of a fireworks display has probably inspired quite a few people to try getting their own bird's-eye view this year. Wired cautions photographers, though, that many municipalities have specifically banned (and some will be looking for) unauthorized airborne visitors, and that the FAA's guidelines for legal flight are tricky to comply with during a fireworks show. This is both because it's hard to maintain visual contact with a drone amid the dark and smoke of a show, and because of the altitude at which many commercial firework shells burst. In addition, even if a drone photo mission goes under the radar vis-a-vis local authorities, if resulting footage appears on an ad-supported site, like YouTube, the FAA may be a bit more interested than the pilot would like.
Games

Someone Will Die Playing a Game In Virtual Reality 120 120

SlappingOysters writes: Grab It has detailed a hands-on session with horror VR title Kitchen — from Resident Evil creator Capcom — and argues how the physical reaction to the experience could lead to death. The site also believes that classifying VR games will be a challenge and many titles could be banned. Virtual Reality has a big year ahead, with the HTC Vive, Oculus Rift and Project Morpheus all set to release, while Microsoft is working on the HoloLens, which the site argues adds a further challenge to traditional gaming.
AI

Machine Learning System Detects Emotions and Suicidal Behavior 33 33

An anonymous reader writes with word as reported by The Stack of a new machine learning technology under development at the Technion-Israel Institute of Technology "which can identify emotion in text messages and email, such as sarcasm, irony and even antisocial or suicidal thoughts." Computer science student Eden Saig, the system's creator, explains that in text and email messages, many of the non-verbal cues (like facial expression) that we use to interpret language are missing. His software applies semantic analysis to those online communications and tries to figure out their emotional import and context by looking for word patterns (not just more superficial markers like emoticons or explicit labels like "[sarcasm]"), and can theoretically identify clues of threatening or self-destructive behavior.
Movies

How To Design Robot Overlords For "Robot Overlords" 16 16

Hallie Siegel writes: Ever wonder how they make robots look so awesomely real in movies? Visual effects expert Graham Edwards goes behind the scenes with the makers of Robot Overlords to take you through the development of the robots in this movie, from script development and sketches, to filming and post FX. Really cool to see how these robots come to life.
Crime

In Response to Open Letter, France Rejects Asylum For Julian Assange 133 133

Several outlets report that Julian Assange has requested, but been denied, political asylum in France, by means of an open letter published by Le Monde. From The Globe and Mail's coverage, linked above: Less than an hour after his letter was published by Le Monde's website, Hollande's office issued a statement saying the asylum request was rejected.

"France has received the letter from Mr. Assange. An in-depth review shows that in view of the legal and material elements of Mr Assange's situation, France cannot grant his request," the statement said.

"The situation of Mr. Assange does not present any immediate danger. He is also the target of a European arrest warrant," it noted.

Assange wrote in the letter that his youngest child is French, and so is the child’s mother. "I haven't been able to see them in five years, since the political persecution against me started," he said.
Worth noting: Assange's legal team says that Assange's letter has been mischaracterized, and that it is in fact not a request for asylum per se; instead, they assert, the letter merely expresses Assange's "willingness 'to be hosted in France if and only if an initiative was taken by the competent authorities.'"